Results 1 to 10 of about 47,392 (384)
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu+4 more
doaj +4 more sources
CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images. Inspired by recent developments in diffusion models, we discovered that two properties of diffusion models, the ability to achieve translation between two images ...
Jiwen Yu+3 more
arxiv +3 more sources
Steganography Security: Principle and Practice [PDF]
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke+4 more
doaj +2 more sources
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [PDF]
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data.
Caviglione, Luca+3 more
arxiv +3 more sources
Image vaccine against steganography in encrypted domain [PDF]
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj +2 more sources
Survey of the Use of Steganography over the Internet [PDF]
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj +2 more sources
Enhanced payload volume in the least significant bits image steganography using hash function [PDF]
The art of message masking is called steganography. Steganography keeps communication from being seen by any other person. In the domain of information concealment within images, numerous steganographic techniques exist. Digital photos stand out as prime
Yazeed Yasin Ghadi+5 more
doaj +3 more sources
Steganographically Encoded Data [PDF]
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
doaj +2 more sources
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan+5 more
doaj +3 more sources
RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui+3 more
semanticscholar +1 more source